Netsec Explained
Get Started in AI CTFs
14:57
Netsec Explained
Real-world Attacks on LLM Applications
39:03
Netsec Explained
3 Things You Need to Know for Modern Application Hacking
12:19
Netsec Explained
What Time is the 3 O' Clock Parade? | Soft Skills for Hackers
6:18
Netsec Explained
STRIDE Threat Modeling for Beginners - In 20 Minutes
21:49
Netsec Explained
Little Known Web Hack for Quick Admin Access
10:57
Netsec Explained
Master Burp Suite Like A Pro In Just 1 Hour
51:29
Netsec Explained
Hitting the Digital Wall - How to Deal With Burnout
4:48
Netsec Explained
Pivot Through Multiple Networks | Master Network Pivoting
9:52
Netsec Explained
ChatGPT for Cybersecurity | Step-by-Step Guide
46:10
Netsec Explained
Tunneling Through Protected Networks | Master Network Pivoting
14:12
Netsec Explained
Full SQL Injection Tutorial | Episode 3: Blind SQL Injection A-Z
29:37
Netsec Explained
Full SQL Injection Tutorial | Episode 2: In-band SQL Injection
21:21
Netsec Explained
Full SQL Injection Tutorial | Episode 1: SQL Basics in 15 Minutes
15:01
Netsec Explained
Cloud Pentesting - IAM Enumeration for Privilege Escalation
31:31
Netsec Explained
Advanced Local and Remote File Inclusion - PHP Wrappers
11:19
Netsec Explained
Bug Bounties with Bash
24:12
Netsec Explained
Bug Bounty and Pentesting with Docker
14:25
Netsec Explained
Exploit Java Deserialization | Exploiting JBoss 6.1.0
10:11
Netsec Explained
Exploit Java Deserialization | Discovering Insecure Deserialization
11:17
Netsec Explained
Exploit Java Deserialization | Understanding Serialized Data
8:18
Netsec Explained
Top 10 Tips for Passing Your OSCP
27:46
Netsec Explained
Advanced Nmap - Scanning Large Scale Networks
11:23
Netsec Explained
6 Types of Hackers That Don't Exist (and 5 More That Do)
10:37
Netsec Explained
Machine Learning for Security Analysts - Part 3: Malicious URL Predictor
16:36
Netsec Explained
Machine Learning for Security Analysts - Part 2: Building a Spam Filter
23:45
Netsec Explained
Machine Learning for Security Analysts - Part 1: The Machine Learning Process
15:02
Netsec Explained
Advanced Wireshark Network Forensics - Part 3/3
12:00
Netsec Explained
Advanced Wireshark Network Forensics - Part 2/3
13:58
Netsec Explained
Advanced Wireshark Network Forensics - Part 1/3
7:27
Netsec Explained
Web Hacker Basics 08 (Blind SQL Injection); featuring SQLmap
7:42
Netsec Explained
Web Hacker Basics 07 (CSRF); chaining attacks together
7:16
Netsec Explained
Web Hacker Basics 06 (Parameter Tampering); featuring Burp Proxy
6:37
Netsec Explained
Web Hacker Basics 05 (Brute Forcing); featuring THC Hydra
8:37
Netsec Explained
Web Hacker Basics 04 (Local and Remote File Inclusion)
9:52
Netsec Explained
Web Hacker Basics 03 (Command Injection)
5:06
Netsec Explained
Web Hacker Basics 02 (XSS)
9:45
Netsec Explained
Web Hacker Basics 01 (SQL Injection)
10:11
Netsec Explained
Building a Web Hacking Lab (w/ XAMPP and DVWA)
7:42
Netsec Explained
Web Hacker Basics 00 (Intro)
2:17